g3tsyst3m/elevationstation

elevate to SYSTEM any way we can! Metasploit and PSEXEC getsystem alternative

C++Cprivilege-escalationmetasploituac-bypassprivilege-elevationhtbgetsystemelevated-accessg3tsyst3mpsecec
This is stars and forks stats for /g3tsyst3m/elevationstation repository. As of 02 May, 2024 this repository has 273 stars and 32 forks.

Elevation Station Stealing and Duplicating SYSTEM tokens for fun & profit! We duplicate things, make twin copies, and then ride away. You have used Metasploit's getsystem and SysInternals PSEXEC for getting system privs, correct? Well, here's a similar standalone version of that...but without the AV issues...at least for now 😸 This tool also enables you to become TrustedInstaller, similar to what Process Hacker/System Informer can do. This functionality is very new and added in the latest...
Read on GithubGithub Stats Page
repotechsstarsweeklyforksweekly
ztxz16/fastllmC++CudaPython2.3k02510
us3rT0m/OnlyUP-TrainerC++CMake58015-1
mit-pdos/perennialCoqPythonOther1110240
imdrasil/kemal_and_jennifer_sample_appCrystalCSSJavaScript14010
sb2nov/week2-devopsCSSPythonHTML101100
dftd4/dftd4FortranPythonCMake126+2400
holygeek/gcovjoinPerlC0000
bentoml/OpenLLMPythonClojureShell6.3k04280
princeton-vl/infinigenPythonCC++4.7k04780
ices-tools-dev/mixfish_fo_app_devRCSSJavaScript0000